FEMA

FEMA crowdsources disaster response

FEMA's mobile app now has a feature that allows citizens to photograph, geotag and explain conditions in their local area.

mobility

Dell Software addresses agency needs in BYOD, big data and security

Dell Software recently announced new tools for mobility management, security and business intelligence.

SI 3D

Smithsonian builds Internet of connected exhibits, specimens, research apps

The Smithsonian Institution is undergoing a digital makeover to support more interactive exhibits, displays and research applications for the public and research communities.

security

CSA pushes software-defined perimeter network protection

Standardized SDP security framework will protect application infrastructures from network-based attacks.

ID

Certificate-on-Chip offers identity as a service for mobile devices

New service brings increased security and access management for both employee-owned and corporate-issued devices.

Nett Warrior

DOD tech demo moves battlefield intell to the tip of the spear

Agile Bloodhound showed what combination of intelligence, surveillance and reconnaissance could be used to deliver tactical intelligence to front-line troops.

wifi

University deploys high-density antennas to deliver Wi-Fi for 40,000-plus devices

Georgia Tech uses focus-beamed antennas to cut down on interference in its large-capacity classrooms.

logs

5 signs of network trouble

Checking for unusual activity in log and event management data can help admins spot the changes that can compromise network security.

LiveSafe dashboard

App users boost situational awareness on campus

LiveSafe makes reporting suspicious activity easier and gives safety officials a multilayer platform to increase safety awareness.

mobility

Mind your mobile: 2014's challenges (and solutions) for mobile government

Secure devices, virtualized mobile solutions and the Internet of Things will be at the top of mind for government IT managers.

mobile

How to put SharePoint in the palm of your hand

Mobile Entrée lets users access SharePoint features via Web browsers on their smartphones and tablet computers.

BES 10

BlackBerry BES 10.2 takes on enterprise BYOD

New features for enterprise mobile management include API and update support for iOS and Android.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.